Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
a91a303661992ebe5f648db8fcc603e8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a91a303661992ebe5f648db8fcc603e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a91a303661992ebe5f648db8fcc603e8_JaffaCakes118.html
-
Size
15KB
-
MD5
a91a303661992ebe5f648db8fcc603e8
-
SHA1
57113262761c8c1e438f1b6e7c6ef530190f38d2
-
SHA256
15cf6a46e38de92918d5040c68828d3817240547a4e72dfc7a3483a2617bee4c
-
SHA512
52c3adb21f0c56b6e4269ffd9a1ded6cc30a15bf0580e6244cd350de01e390f2a9581e8ea2f6a7492f77b0a17369e4928e57b010750b1d8757e9518b0b0d4278
-
SSDEEP
192:63m9cdwAZPpoqFsf3nOnJ2IA0WWjD5U8d2bd2hKjhRvP61tcVXRXft3ML:62cDaXfk2SWW5iRn6LcVhV3ML
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 2996 msedge.exe 2996 msedge.exe 1112 identity_helper.exe 1112 identity_helper.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 916 2996 msedge.exe 84 PID 2996 wrote to memory of 916 2996 msedge.exe 84 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 2720 2996 msedge.exe 85 PID 2996 wrote to memory of 3484 2996 msedge.exe 86 PID 2996 wrote to memory of 3484 2996 msedge.exe 86 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87 PID 2996 wrote to memory of 224 2996 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a91a303661992ebe5f648db8fcc603e8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfad146f8,0x7ffdfad14708,0x7ffdfad147182⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1500,15467188817960294031,18422201704945508279,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
188B
MD56e7fd1f66534c999aa1832cce7e0303a
SHA1fff2b74d335e06888b74f0aed6d29adbb180d2e0
SHA2567af00779f91d975307bf5aa5cae8512446dbf5f1f914a92f37bb78edcd84bf39
SHA51221460fb3c9f14bfad9249f3005b681dbdf53849e15182b2723d65d45b93dbc63f4df4ce1144d2f29486bd9a73ed1136d5fc9ac213ed0872957f67f531b493886
-
Filesize
5KB
MD558a1971e2098bcfe1fdfe47998ec55b0
SHA11b7adb389d62ed25795a1f341684839efc3fd1d6
SHA256f62fb2eb4028b711b34c10600a4e82fbf950f9619047aad0de4d3e6695a686d2
SHA512b4f19086104af9edb8847e430ea4fcb257634e56b270b51e47fff6b7f1bdbef8a44a21e96685f798da8362258464cb9347a6e6e63231262d8cb702948f83a6cf
-
Filesize
6KB
MD5c53096ef50df73d09f374d3a78cd2d78
SHA13ba4219297d4793d2daeaec52570461aa602ff1d
SHA2560d6a1a850d3eab3a34741f43b565585bd4b31bf07abe9d9fc470a759ce653219
SHA512a8d1fe2727d439afa073e7512c8981950f86a72f8ae55d46ebc0a01111bf863c9d7e8e43d3a41724b483ecb5f15037bcd03bcc29a6c3909b64ce892f53287d4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a1480d809b2b60cd53592a4f3a7a58b0
SHA1dab0412fbfbcc7e3723f2954724d5306728a7ff0
SHA256e3fd5313571212d2a1e99f738dc1299cd81d1e1a85061850f2d34cf29c820e4d
SHA51237411266816339dfc82b4f931aec7245af5f6cc5741536e6bf270192b575bba09da48ebb157f1a8c390a8611512348438beed4e8457696d83f0c7041cce7d830